Note: students under the supervision of me are marked by '*'

2020

  • Liveness Detection for Voice User Interface via Wireless Signals in IoT Environment,
    Yan Meng, Haojin Zhu, Jinlei Li, Jin Li, and Yao Liu
    IEEE Trans. Mobile Computing (TMC), to appear.
  • Wireless-Assisted Key Establishment Leveraging Channel Manipulation,
    Song Fang*, Ian Markwood*, Yao Liu
    IEEE Trans. Mobile Computing (TMC), to appear.
  • ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference,
    Tao Hou*, Zhe Qu, Tao Wang*, Zhuo Lu, and Yao Liu
    IEEE Conference on Computer Communications (INFOCOM), Apr. 2020.
  • Comb Decoding towards Collision-Free WiFi,
    Shangqing Zhao, Zhe Qu, Zhengping Luo, Zhuo Lu and Yao Liu
    USENIX Symposium on Networked Systems Design and Implementation (NSDI), Feb. 2020.

2019

  • Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic,
    Tao Hou*, Tao Wang*, Zhuo Lu, and Yao Liu
    IEEE Global Conference on Signal and Information Processing (GlobalSIP), Nov. 2019.
  • CFHider: Control Flow Obfuscation with Intel SGX,
    Yongzhi Wang, Yulong Shen, Cuicui Su, Ke Cheng, Yibo Yang, Anter Faree, and Yao Liu
    IEEE Conference on Computer Communications (INFOCOM), Apr. 2019.
  • Entrapment for Wireless Eavesdroppers,
    Song Fang*, Tao Wang*, Yao Liu, Shangqing Zhao, and Zhuo Lu
    IEEE Conference on Computer Communications (INFOCOM), Apr. 2019.
  • Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks,
    Shangqing Zhao, Zhengping Luo, Zhuo Lu, and Yao Liu
    IEEE Conference on Computer Communications (INFOCOM), Apr. 2019.
  • Virtual Safe: Unauthorized Walking Behavior Detection for Mobile Devices,
    Dakun Shen*, Ian Markwood*, Dan Shen, and Yao Liu
    IEEE Trans. Mobile Computing (TMC), Mar. 2019.

2018

  • Adaptive Human-Machine Interactive Behavior Analysis with Wrist-Worn Devices for Password Inference,
    Chao Shen, Yufei Chen, Yao Liu, and Xiaohong Guan
    IEEE Trans. Neural Networks and Learning Systems (TNNLS), Dec. 2018.
  • No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing,
    Song Fang*, Ian Markwood*, Yao Liu, Shangqing Zhao, Zhuo Lu, and Haojin Zhu
    ACM Conference on Computer and Communications Security (CCS), Oct. 2018.
  • Location Privacy Violation via GPSagnostic Smart Phone Car Tracking,
    Zi Li*, Qingqi Pei, Ian Markwood*, Yao Liu, Miao Pan, and Hongning Li
    IEEE Trans. Vehicular Technology (TVT), June 2018.
  • WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment,
    Yan Meng, Zichang Wang, Wei Zhang, Peilin Wu, Haojin Zhu, Xiaohui Liang, and Yao Liu
    ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), June 2018.
  • Secret Key Establishment via RSS Trajectory Matching,
    Zi Li*, Qingqi Pei, Ian Markwood*, Yao Liu, and Haojin Zhu
    IEEE Trans. Information Forensics and Security (TIFS), vol. 13, no. 3, Mar. 2018.

2017

2016

2015

2014

2013

2012

2011

2010

2009



© COPYRIGHT 2020 Yao Liu, University of South Florida.